#include #if USE_AWS_S3 # include # include # include # include # include # include # include # include # include # include # include # include # include # include # include # include # include # include # include # include # include # include namespace { const char * S3_LOGGER_TAG_NAMES[][2] = { {"AWSClient", "AWSClient"}, {"AWSAuthV4Signer", "AWSClient (AWSAuthV4Signer)"}, }; const std::pair & convertLogLevel(Aws::Utils::Logging::LogLevel log_level) { static const std::unordered_map> mapping = { {Aws::Utils::Logging::LogLevel::Off, {DB::LogsLevel::none, Poco::Message::PRIO_FATAL}}, {Aws::Utils::Logging::LogLevel::Fatal, {DB::LogsLevel::error, Poco::Message::PRIO_FATAL}}, {Aws::Utils::Logging::LogLevel::Error, {DB::LogsLevel::error, Poco::Message::PRIO_ERROR}}, {Aws::Utils::Logging::LogLevel::Warn, {DB::LogsLevel::warning, Poco::Message::PRIO_WARNING}}, {Aws::Utils::Logging::LogLevel::Info, {DB::LogsLevel::information, Poco::Message::PRIO_INFORMATION}}, {Aws::Utils::Logging::LogLevel::Debug, {DB::LogsLevel::trace, Poco::Message::PRIO_TRACE}}, {Aws::Utils::Logging::LogLevel::Trace, {DB::LogsLevel::trace, Poco::Message::PRIO_TRACE}}, }; return mapping.at(log_level); } class AWSLogger final : public Aws::Utils::Logging::LogSystemInterface { public: AWSLogger() { for (auto [tag, name] : S3_LOGGER_TAG_NAMES) tag_loggers[tag] = &Poco::Logger::get(name); default_logger = tag_loggers[S3_LOGGER_TAG_NAMES[0][0]]; } ~AWSLogger() final = default; Aws::Utils::Logging::LogLevel GetLogLevel() const final { return Aws::Utils::Logging::LogLevel::Trace; } void Log(Aws::Utils::Logging::LogLevel log_level, const char * tag, const char * format_str, ...) final // NOLINT { callLogImpl(log_level, tag, format_str); /// FIXME. Variadic arguments? } void LogStream(Aws::Utils::Logging::LogLevel log_level, const char * tag, const Aws::OStringStream & message_stream) final { callLogImpl(log_level, tag, message_stream.str().c_str()); } void callLogImpl(Aws::Utils::Logging::LogLevel log_level, const char * tag, const char * message) { const auto & [level, prio] = convertLogLevel(log_level); if (tag_loggers.count(tag) > 0) { LOG_IMPL(tag_loggers[tag], level, prio, "{}", message); } else { LOG_IMPL(default_logger, level, prio, "{}: {}", tag, message); } } void Flush() final {} private: Poco::Logger * default_logger; std::unordered_map tag_loggers; }; class AWSEC2MetadataClient : public Aws::Internal::AWSHttpResourceClient { static constexpr char EC2_SECURITY_CREDENTIALS_RESOURCE[] = "/latest/meta-data/iam/security-credentials"; static constexpr char EC2_IMDS_TOKEN_RESOURCE[] = "/latest/api/token"; static constexpr char EC2_IMDS_TOKEN_HEADER[] = "x-aws-ec2-metadata-token"; static constexpr char EC2_IMDS_TOKEN_TTL_DEFAULT_VALUE[] = "21600"; static constexpr char EC2_IMDS_TOKEN_TTL_HEADER[] = "x-aws-ec2-metadata-token-ttl-seconds"; static constexpr char EC2_DEFAULT_METADATA_ENDPOINT[] = "http://169.254.169.254"; public: /// See EC2MetadataClient. explicit AWSEC2MetadataClient(const Aws::Client::ClientConfiguration & client_configuration) : Aws::Internal::AWSHttpResourceClient(client_configuration) , logger(&Poco::Logger::get("AWSEC2InstanceProfileConfigLoader")) { } AWSEC2MetadataClient& operator =(const AWSEC2MetadataClient & rhs) = delete; AWSEC2MetadataClient(const AWSEC2MetadataClient & rhs) = delete; AWSEC2MetadataClient& operator =(const AWSEC2MetadataClient && rhs) = delete; AWSEC2MetadataClient(const AWSEC2MetadataClient && rhs) = delete; virtual ~AWSEC2MetadataClient() override = default; using Aws::Internal::AWSHttpResourceClient::GetResource; virtual Aws::String GetResource(const char * resource_path) const { return GetResource(endpoint.c_str(), resource_path, nullptr/*authToken*/); } virtual Aws::String getDefaultCredentials() const { String credentials_string; { std::unique_lock locker(token_mutex); LOG_TRACE(logger, "Getting default credentials for EC2 instance."); auto result = GetResourceWithAWSWebServiceResult(endpoint.c_str(), EC2_SECURITY_CREDENTIALS_RESOURCE, nullptr); credentials_string = result.GetPayload(); if (result.GetResponseCode() == Aws::Http::HttpResponseCode::UNAUTHORIZED) { return {}; } } String trimmed_credentials_string = Aws::Utils::StringUtils::Trim(credentials_string.c_str()); if (trimmed_credentials_string.empty()) return {}; std::vector security_credentials = Aws::Utils::StringUtils::Split(trimmed_credentials_string, '\n'); LOG_DEBUG(logger, "Calling EC2MetadataService resource, {} returned credential string {}.", EC2_SECURITY_CREDENTIALS_RESOURCE, trimmed_credentials_string); if (security_credentials.empty()) { LOG_WARNING(logger, "Initial call to EC2MetadataService to get credentials failed."); return {}; } Aws::StringStream ss; ss << EC2_SECURITY_CREDENTIALS_RESOURCE << "/" << security_credentials[0]; LOG_DEBUG(logger, "Calling EC2MetadataService resource {}.", ss.str()); return GetResource(ss.str().c_str()); } static Aws::String awsComputeUserAgentString() { Aws::StringStream ss; ss << "aws-sdk-cpp/" << Aws::Version::GetVersionString() << " " << Aws::OSVersionInfo::ComputeOSVersionString() << " " << Aws::Version::GetCompilerVersionString(); return ss.str(); } virtual Aws::String getDefaultCredentialsSecurely() const { String user_agent_string = awsComputeUserAgentString(); String new_token; { std::unique_lock locker(token_mutex); Aws::StringStream ss; ss << endpoint << EC2_IMDS_TOKEN_RESOURCE; std::shared_ptr token_request(Aws::Http::CreateHttpRequest(ss.str(), Aws::Http::HttpMethod::HTTP_PUT, Aws::Utils::Stream::DefaultResponseStreamFactoryMethod)); token_request->SetHeaderValue(EC2_IMDS_TOKEN_TTL_HEADER, EC2_IMDS_TOKEN_TTL_DEFAULT_VALUE); token_request->SetUserAgent(user_agent_string); LOG_TRACE(logger, "Calling EC2MetadataService to get token."); auto result = GetResourceWithAWSWebServiceResult(token_request); const String & token_string = result.GetPayload(); new_token = Aws::Utils::StringUtils::Trim(token_string.c_str()); if (result.GetResponseCode() == Aws::Http::HttpResponseCode::BAD_REQUEST) { return {}; } else if (result.GetResponseCode() != Aws::Http::HttpResponseCode::OK || new_token.empty()) { LOG_TRACE(logger, "Calling EC2MetadataService to get token failed, falling back to less secure way."); return getDefaultCredentials(); } token = new_token; } String url = endpoint + EC2_SECURITY_CREDENTIALS_RESOURCE; std::shared_ptr profile_request(Aws::Http::CreateHttpRequest(url, Aws::Http::HttpMethod::HTTP_GET, Aws::Utils::Stream::DefaultResponseStreamFactoryMethod)); profile_request->SetHeaderValue(EC2_IMDS_TOKEN_HEADER, new_token); profile_request->SetUserAgent(user_agent_string); String profile_string = GetResourceWithAWSWebServiceResult(profile_request).GetPayload(); String trimmed_profile_string = Aws::Utils::StringUtils::Trim(profile_string.c_str()); std::vector security_credentials = Aws::Utils::StringUtils::Split(trimmed_profile_string, '\n'); LOG_DEBUG(logger, "Calling EC2MetadataService resource, {} with token returned profile string {}.", EC2_SECURITY_CREDENTIALS_RESOURCE, trimmed_profile_string); if (security_credentials.empty()) { LOG_WARNING(logger, "Calling EC2Metadataservice to get profiles failed."); return {}; } Aws::StringStream ss; ss << endpoint << EC2_SECURITY_CREDENTIALS_RESOURCE << "/" << security_credentials[0]; std::shared_ptr credentials_request(Aws::Http::CreateHttpRequest(ss.str(), Aws::Http::HttpMethod::HTTP_GET, Aws::Utils::Stream::DefaultResponseStreamFactoryMethod)); credentials_request->SetHeaderValue(EC2_IMDS_TOKEN_HEADER, new_token); credentials_request->SetUserAgent(user_agent_string); LOG_DEBUG(logger, "Calling EC2MetadataService resource {} with token.", ss.str()); return GetResourceWithAWSWebServiceResult(credentials_request).GetPayload(); } virtual Aws::String getCurrentRegion() const { return Aws::Region::AWS_GLOBAL; } private: const Aws::String endpoint = EC2_DEFAULT_METADATA_ENDPOINT; mutable std::recursive_mutex token_mutex; mutable Aws::String token; Poco::Logger * logger; }; class AWSEC2InstanceProfileConfigLoader : public Aws::Config::AWSProfileConfigLoader { public: explicit AWSEC2InstanceProfileConfigLoader(const std::shared_ptr & client_, bool use_secure_pull_) : client(client_) , use_secure_pull(use_secure_pull_) , logger(&Poco::Logger::get("AWSEC2InstanceProfileConfigLoader")) { } virtual ~AWSEC2InstanceProfileConfigLoader() override = default; protected: virtual bool LoadInternal() override { auto credentials_str = use_secure_pull ? client->getDefaultCredentialsSecurely() : client->getDefaultCredentials(); /// See EC2InstanceProfileConfigLoader. if (credentials_str.empty()) return false; Aws::Utils::Json::JsonValue credentials_doc(credentials_str); if (!credentials_doc.WasParseSuccessful()) { LOG_ERROR(logger, "Failed to parse output from EC2MetadataService."); return false; } String access_key, secret_key, token; auto credentials_view = credentials_doc.View(); access_key = credentials_view.GetString("AccessKeyId"); LOG_ERROR(logger, "Successfully pulled credentials from EC2MetadataService with access key {}.", access_key); secret_key = credentials_view.GetString("SecretAccessKey"); token = credentials_view.GetString("Token"); auto region = client->getCurrentRegion(); Aws::Config::Profile profile; profile.SetCredentials(Aws::Auth::AWSCredentials(access_key, secret_key, token)); profile.SetRegion(region); profile.SetName(Aws::Config::INSTANCE_PROFILE_KEY); m_profiles[Aws::Config::INSTANCE_PROFILE_KEY] = profile; return true; } private: std::shared_ptr client; bool use_secure_pull; Poco::Logger * logger; }; class AWSInstanceProfileCredentialsProvider : public Aws::Auth::AWSCredentialsProvider { public: /// See InstanceProfileCredentialsProvider. explicit AWSInstanceProfileCredentialsProvider(const std::shared_ptr & config_loader) : ec2_metadata_config_loader(config_loader) , load_frequency_ms(Aws::Auth::REFRESH_THRESHOLD) , logger(&Poco::Logger::get("AWSInstanceProfileCredentialsProvider")) { LOG_INFO(logger, "Creating Instance with injected EC2MetadataClient and refresh rate {}."); } Aws::Auth::AWSCredentials GetAWSCredentials() override { refreshIfExpired(); Aws::Utils::Threading::ReaderLockGuard guard(m_reloadLock); auto profile_it = ec2_metadata_config_loader->GetProfiles().find(Aws::Config::INSTANCE_PROFILE_KEY); if (profile_it != ec2_metadata_config_loader->GetProfiles().end()) { return profile_it->second.GetCredentials(); } return Aws::Auth::AWSCredentials(); } protected: void Reload() override { LOG_INFO(logger, "Credentials have expired attempting to repull from EC2 Metadata Service."); ec2_metadata_config_loader->Load(); AWSCredentialsProvider::Reload(); } private: void refreshIfExpired() { LOG_DEBUG(logger, "Checking if latest credential pull has expired."); Aws::Utils::Threading::ReaderLockGuard guard(m_reloadLock); if (!IsTimeToRefresh(load_frequency_ms)) { return; } guard.UpgradeToWriterLock(); if (!IsTimeToRefresh(load_frequency_ms)) // double-checked lock to avoid refreshing twice { return; } Reload(); } std::shared_ptr ec2_metadata_config_loader; Int64 load_frequency_ms; Poco::Logger * logger; }; class S3CredentialsProviderChain : public Aws::Auth::AWSCredentialsProviderChain { public: explicit S3CredentialsProviderChain(const DB::S3::PocoHTTPClientConfiguration & configuration, const Aws::Auth::AWSCredentials & credentials, bool use_environment_credentials, bool use_insecure_imds_request) { auto * logger = &Poco::Logger::get("S3CredentialsProviderChain"); if (use_environment_credentials) { static const char AWS_ECS_CONTAINER_CREDENTIALS_RELATIVE_URI[] = "AWS_CONTAINER_CREDENTIALS_RELATIVE_URI"; static const char AWS_ECS_CONTAINER_CREDENTIALS_FULL_URI[] = "AWS_CONTAINER_CREDENTIALS_FULL_URI"; static const char AWS_ECS_CONTAINER_AUTHORIZATION_TOKEN[] = "AWS_CONTAINER_AUTHORIZATION_TOKEN"; static const char AWS_EC2_METADATA_DISABLED[] = "AWS_EC2_METADATA_DISABLED"; /// The only difference from DefaultAWSCredentialsProviderChain::DefaultAWSCredentialsProviderChain() /// is that this chain uses custom ClientConfiguration. AddProvider(std::make_shared()); AddProvider(std::make_shared()); AddProvider(std::make_shared()); AddProvider(std::make_shared()); /// ECS TaskRole Credentials only available when ENVIRONMENT VARIABLE is set. const auto relative_uri = Aws::Environment::GetEnv(AWS_ECS_CONTAINER_CREDENTIALS_RELATIVE_URI); LOG_DEBUG(logger, "The environment variable value {} is {}", AWS_ECS_CONTAINER_CREDENTIALS_RELATIVE_URI, relative_uri); const auto absolute_uri = Aws::Environment::GetEnv(AWS_ECS_CONTAINER_CREDENTIALS_FULL_URI); LOG_DEBUG(logger, "The environment variable value {} is {}", AWS_ECS_CONTAINER_CREDENTIALS_FULL_URI, absolute_uri); const auto ec2_metadata_disabled = Aws::Environment::GetEnv(AWS_EC2_METADATA_DISABLED); LOG_DEBUG(logger, "The environment variable value {} is {}", AWS_EC2_METADATA_DISABLED, ec2_metadata_disabled); if (!relative_uri.empty()) { AddProvider(std::make_shared(relative_uri.c_str())); LOG_INFO(logger, "Added ECS metadata service credentials provider with relative path: [{}] to the provider chain.", relative_uri); } else if (!absolute_uri.empty()) { const auto token = Aws::Environment::GetEnv(AWS_ECS_CONTAINER_AUTHORIZATION_TOKEN); AddProvider(std::make_shared(absolute_uri.c_str(), token.c_str())); /// DO NOT log the value of the authorization token for security purposes. LOG_INFO(logger, "Added ECS credentials provider with URI: [{}] to the provider chain with a{} authorization token.", absolute_uri, token.empty() ? "n empty" : " non-empty"); } else if (Aws::Utils::StringUtils::ToLower(ec2_metadata_disabled.c_str()) != "true") { DB::S3::PocoHTTPClientConfiguration aws_client_configuration = DB::S3::ClientFactory::instance().createClientConfiguration(configuration.region, configuration.remote_host_filter, configuration.s3_max_redirects); /// See MakeDefaultHttpResourceClientConfiguration(). /// This is part of EC2 metadata client, but unfortunately it can't be accessed from outside /// of contrib/aws/aws-cpp-sdk-core/source/internal/AWSHttpResourceClient.cpp aws_client_configuration.maxConnections = 2; aws_client_configuration.scheme = Aws::Http::Scheme::HTTP; /// Explicitly set the proxy settings to empty/zero to avoid relying on defaults that could potentially change /// in the future. aws_client_configuration.proxyHost = ""; aws_client_configuration.proxyUserName = ""; aws_client_configuration.proxyPassword = ""; aws_client_configuration.proxyPort = 0; /// EC2MetadataService throttles by delaying the response so the service client should set a large read timeout. /// EC2MetadataService delay is in order of seconds so it only make sense to retry after a couple of seconds. aws_client_configuration.connectTimeoutMs = 1000; /// FIXME. Somehow this timeout does not work in docker without --net=host. aws_client_configuration.requestTimeoutMs = 1000; aws_client_configuration.retryStrategy = std::make_shared(1, 1000); auto ec2_metadata_client = std::make_shared(aws_client_configuration); auto config_loader = std::make_shared(ec2_metadata_client, !use_insecure_imds_request); AddProvider(std::make_shared(config_loader)); LOG_INFO(logger, "Added EC2 metadata service credentials provider to the provider chain."); } } AddProvider(std::make_shared(credentials)); } }; class S3AuthSigner : public Aws::Client::AWSAuthV4Signer { public: S3AuthSigner( const Aws::Client::ClientConfiguration & client_configuration, const Aws::Auth::AWSCredentials & credentials, const DB::HeaderCollection & headers_, bool use_environment_credentials, bool use_insecure_imds_request) : Aws::Client::AWSAuthV4Signer( std::make_shared( static_cast(client_configuration), credentials, use_environment_credentials, use_insecure_imds_request), "s3", client_configuration.region, Aws::Client::AWSAuthV4Signer::PayloadSigningPolicy::Never, false) , headers(headers_) { } bool SignRequest(Aws::Http::HttpRequest & request, const char * region, bool sign_body) const override { auto result = Aws::Client::AWSAuthV4Signer::SignRequest(request, region, sign_body); for (const auto & header : headers) request.SetHeaderValue(header.name, header.value); return result; } bool SignRequest(Aws::Http::HttpRequest & request, const char * region, const char * service_name, bool sign_body) const override { auto result = Aws::Client::AWSAuthV4Signer::SignRequest(request, region, service_name, sign_body); for (const auto & header : headers) request.SetHeaderValue(header.name, header.value); return result; } bool PresignRequest( Aws::Http::HttpRequest & request, const char * region, long long expiration_time_sec) const override // NOLINT { auto result = Aws::Client::AWSAuthV4Signer::PresignRequest(request, region, expiration_time_sec); for (const auto & header : headers) request.SetHeaderValue(header.name, header.value); return result; } bool PresignRequest( Aws::Http::HttpRequest & request, const char * region, const char * service_name, long long expiration_time_sec) const override // NOLINT { auto result = Aws::Client::AWSAuthV4Signer::PresignRequest(request, region, service_name, expiration_time_sec); for (const auto & header : headers) request.SetHeaderValue(header.name, header.value); return result; } private: const DB::HeaderCollection headers; }; } namespace DB { namespace ErrorCodes { extern const int BAD_ARGUMENTS; } namespace S3 { ClientFactory::ClientFactory() { aws_options = Aws::SDKOptions{}; Aws::InitAPI(aws_options); Aws::Utils::Logging::InitializeAWSLogging(std::make_shared()); Aws::Http::SetHttpClientFactory(std::make_shared()); } ClientFactory::~ClientFactory() { Aws::Utils::Logging::ShutdownAWSLogging(); Aws::ShutdownAPI(aws_options); } ClientFactory & ClientFactory::instance() { static ClientFactory ret; return ret; } std::shared_ptr ClientFactory::create( // NOLINT const PocoHTTPClientConfiguration & cfg_, bool is_virtual_hosted_style, const String & access_key_id, const String & secret_access_key, const String & server_side_encryption_customer_key_base64, HeaderCollection headers, bool use_environment_credentials, bool use_insecure_imds_request) { PocoHTTPClientConfiguration client_configuration = cfg_; client_configuration.updateSchemeAndRegion(); Aws::Auth::AWSCredentials credentials(access_key_id, secret_access_key); if (!server_side_encryption_customer_key_base64.empty()) { /// See S3Client::GeneratePresignedUrlWithSSEC(). headers.push_back({Aws::S3::SSEHeaders::SERVER_SIDE_ENCRYPTION_CUSTOMER_ALGORITHM, Aws::S3::Model::ServerSideEncryptionMapper::GetNameForServerSideEncryption(Aws::S3::Model::ServerSideEncryption::AES256)}); headers.push_back({Aws::S3::SSEHeaders::SERVER_SIDE_ENCRYPTION_CUSTOMER_KEY, server_side_encryption_customer_key_base64}); Aws::Utils::ByteBuffer buffer = Aws::Utils::HashingUtils::Base64Decode(server_side_encryption_customer_key_base64); String str_buffer(reinterpret_cast(buffer.GetUnderlyingData()), buffer.GetLength()); headers.push_back({Aws::S3::SSEHeaders::SERVER_SIDE_ENCRYPTION_CUSTOMER_KEY_MD5, Aws::Utils::HashingUtils::Base64Encode(Aws::Utils::HashingUtils::CalculateMD5(str_buffer))}); } auto auth_signer = std::make_shared( client_configuration, std::move(credentials), std::move(headers), use_environment_credentials, use_insecure_imds_request); return std::make_shared( std::move(auth_signer), std::move(client_configuration), // Client configuration. is_virtual_hosted_style || client_configuration.endpointOverride.empty() // Use virtual addressing only if endpoint is not specified. ); } PocoHTTPClientConfiguration ClientFactory::createClientConfiguration( // NOLINT const String & force_region, const RemoteHostFilter & remote_host_filter, unsigned int s3_max_redirects) { return PocoHTTPClientConfiguration(force_region, remote_host_filter, s3_max_redirects); } URI::URI(const Poco::URI & uri_) { /// Case when bucket name represented in domain name of S3 URL. /// E.g. (https://bucket-name.s3.Region.amazonaws.com/key) /// https://docs.aws.amazon.com/AmazonS3/latest/dev/VirtualHosting.html#virtual-hosted-style-access static const RE2 virtual_hosted_style_pattern(R"((.+)\.(s3|cos)([.\-][a-z0-9\-.:]+))"); /// Case when bucket name and key represented in path of S3 URL. /// E.g. (https://s3.Region.amazonaws.com/bucket-name/key) /// https://docs.aws.amazon.com/AmazonS3/latest/dev/VirtualHosting.html#path-style-access static const RE2 path_style_pattern("^/([^/]*)/(.*)"); static constexpr auto S3 = "S3"; static constexpr auto COSN = "COSN"; static constexpr auto COS = "COS"; uri = uri_; storage_name = S3; if (uri.getHost().empty()) throw Exception("Host is empty in S3 URI: " + uri.toString(), ErrorCodes::BAD_ARGUMENTS); String name; String endpoint_authority_from_uri; if (re2::RE2::FullMatch(uri.getAuthority(), virtual_hosted_style_pattern, &bucket, &name, &endpoint_authority_from_uri)) { is_virtual_hosted_style = true; endpoint = uri.getScheme() + "://" + name + endpoint_authority_from_uri; /// S3 specification requires at least 3 and at most 63 characters in bucket name. /// https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-s3-bucket-naming-requirements.html if (bucket.length() < 3 || bucket.length() > 63) throw Exception( "Bucket name length is out of bounds in virtual hosted style S3 URI: " + bucket + " (" + uri.toString() + ")", ErrorCodes::BAD_ARGUMENTS); if (!uri.getPath().empty()) { /// Remove leading '/' from path to extract key. key = uri.getPath().substr(1); } if (key.empty() || key == "/") throw Exception("Key name is empty in virtual hosted style S3 URI: " + key + " (" + uri.toString() + ")", ErrorCodes::BAD_ARGUMENTS); boost::to_upper(name); if (name != S3 && name != COS) { throw Exception("Object storage system name is unrecognized in virtual hosted style S3 URI: " + name + " (" + uri.toString() + ")", ErrorCodes::BAD_ARGUMENTS); } if (name == S3) { storage_name = name; } else { storage_name = COSN; } } else if (re2::RE2::PartialMatch(uri.getPath(), path_style_pattern, &bucket, &key)) { is_virtual_hosted_style = false; endpoint = uri.getScheme() + "://" + uri.getAuthority(); /// S3 specification requires at least 3 and at most 63 characters in bucket name. /// https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-s3-bucket-naming-requirements.html if (bucket.length() < 3 || bucket.length() > 63) throw Exception( "Bucket name length is out of bounds in path style S3 URI: " + bucket + " (" + uri.toString() + ")", ErrorCodes::BAD_ARGUMENTS); if (key.empty() || key == "/") throw Exception("Key name is empty in path style S3 URI: " + key + " (" + uri.toString() + ")", ErrorCodes::BAD_ARGUMENTS); } else throw Exception("Bucket or key name are invalid in S3 URI: " + uri.toString(), ErrorCodes::BAD_ARGUMENTS); } } } #endif